Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1EDF2CA70A0A6AD3F5597C2E5A7309B0F72C1D34ACA77171AA3F8A39E1FC2C51DD61188 |
|
CONTENT
ssdeep
|
384:U58JO60NQq32Iaf1InDt4zp5Q5sI4RcSIi5P2T/:hEQqGIaf1mDetowcSL2r |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d25210aeeced6d45 |
|
VISUAL
aHash
|
000000ffffffffff |
|
VISUAL
dHash
|
c4c8c8c747635504 |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0f003400000 |
|
VISUAL
cropResistant
|
c1a653b6d4d9d1f2,1943676319401506,b886cc88c8c8dcd6 |
Fake 808PAY site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.